What is Splice?

Splice actively prevents cyber-physical attacks through vulnerability shielding inside an encrypted overlay network.
Embrace connection and convergence. Cybersplice your OT security and IoT security: the logical alternative to air-gaps, firewalls, data diodes and old school thinking.


Splice in action

Splice is deployed at the City of Cape Town, enabling secure management of Smart City infrastructure across various disciplines, including Transportation, Surveillance and Facilities Management. Splice provides deep visibility of expected and anomalous activity on these networks and shields vulnerable OT communications inside the encrypted Splice overlay network. Using Splice advanced visualizations, the City was able to identify and mitigate high risk areas, and eliminate avoidable risks to the networks. Splice also provides asset discovery and management, a key requirement to enable secure management of this OT network.



Preventing production line sabotage



Test drive Splice

Test drive Splice with a zero-touch deployment using Cloudsplice-as-a-service. Cloudsplice provides full asset tracking, behavioral analysis and outlier detection using metadata forwarded from your network infrastructure via built-in capabilities. Get in touch via the chat link below for a free evaluation.


Extend your reach across hostile carrier networks

Splice-net builds a dedicated encrypted overlay network on top of existing carrier infrastructure, providing our customers with a secure private sensor network. Splice-net is carrier independent, allowing sensor networks to expand across multiple carrier footprints, and allowing for high availability by rerouting overlay traffic through alternate carriers. Customers remain in full control of encryption keys and therefore fully in charge of their sensor networks, even where traffic traverse hostile or untrustworthy carriers.



Quick intro



How do we do it?

Splice protects OT networks by providing:
  • secure remote access for operators, engineers and support partners
  • secure identity management
  • passive node discovery and tracking
  • behavioural profiling and advanced machine learning driven outlier and anomaly detection
  • logical isolation and encryption

Splice has been specifically designed to require no or minimal reconfiguration and interruption to existing production processes. Splice allows you to take back control over insecure and legacy components.

Applications

SCADA

With Splice there is no need to touch the actual equipment or code.

ICS

Splice overcomes device and controller vulnerabilities by building vulnerability shielding, authentication, authorisation and access controls into the network layer.

Embedded

Splice logically isolates targets in an encrypted overlay network for centralised profiling, segregation and Intrusion Detection.

I-IoT

Splice enables sensitive real world interfacing devices to co-exist securely inside existing IT networks.

 

 

Vulnerability Shielding

IT security practices do not always translate well for OT security or IoT security purposes. For various reasons, it may not be viable to patch vulnerabilities in HMI's and PLC's.

SPLICE provides a way to mitigate these vulnerabilities through Vulnerability Shielding by injecting authentication code into the existing communication flow. When a sensitive function is accessed, SPLICE takes over from the normal application flow and requests OTP or password verification before forwarding the request through to the HMI. Using Vulnerability Shielding, Role Based Access Control (with or without two factor authentication) can be built into legacy applications without touching the application code.

Latest news

28 February, 2021

Critical authentication bypass flaw across multiple Rockwell Logix products

US CISA released an advisory for easy to exploit, remote authentication bypass (with a CVSS score of 10) for multiple  Rockwell Logix controllers. No patches seem to be forthcoming. Rockwell...
Editor
13 February, 2021

Utility providers affected by ransomware attack

Two major Brazilian utility providers operations were affected by  ransomware attack. 
Editor
12 February, 2021

Florida Water Treatment attack

Weak identities, vulnerable code and insecure remote connection   allowed hackers to take control of the facility.
Editor
12 December, 2020

GE medical devices backdoors

Ultrasound and imaging systems with   hardcoded passwords
Editor
22 July, 2020

More Israeli water facilities targeted

First targeted in April   , authorities raised alert   following latest attacks.
Editor
26 June, 2020

Ripple20 said to impact 100's millions IoT devices

Ripple20, a series of vulnerbilities in the widely deployed   Treck TCP/IP stack  will have far reaching implications.
Editor
10 June, 2020

Honda plants halt production after cyber attack

Ransomware attack causes shut down of some of Honda's production lines. Could this be collateral damage  collateral damage  or a targeted attack?
Editor
21 May, 2020

Steel plant operations impacted by Cybersecurity incident

Bluescope steel reported a  cyber incident  causing disruptions to it's Australian operations.
Editor

View all news entries